首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1379篇
  免费   47篇
  国内免费   3篇
电工技术   6篇
综合类   3篇
化学工业   139篇
金属工艺   8篇
机械仪表   27篇
建筑科学   58篇
矿业工程   1篇
能源动力   28篇
轻工业   96篇
水利工程   3篇
石油天然气   3篇
无线电   159篇
一般工业技术   140篇
冶金工业   605篇
原子能技术   2篇
自动化技术   151篇
  2023年   12篇
  2022年   32篇
  2021年   44篇
  2020年   43篇
  2019年   46篇
  2018年   35篇
  2017年   28篇
  2016年   43篇
  2015年   26篇
  2014年   33篇
  2013年   59篇
  2012年   56篇
  2011年   58篇
  2010年   39篇
  2009年   28篇
  2008年   31篇
  2007年   30篇
  2006年   22篇
  2005年   23篇
  2004年   11篇
  2003年   13篇
  2002年   10篇
  2001年   7篇
  2000年   5篇
  1999年   21篇
  1998年   186篇
  1997年   101篇
  1996年   69篇
  1995年   47篇
  1994年   34篇
  1993年   39篇
  1992年   10篇
  1991年   5篇
  1990年   6篇
  1989年   3篇
  1988年   9篇
  1987年   5篇
  1986年   13篇
  1985年   9篇
  1983年   3篇
  1982年   9篇
  1981年   5篇
  1980年   15篇
  1979年   4篇
  1978年   9篇
  1977年   32篇
  1976年   52篇
  1975年   5篇
  1973年   1篇
  1972年   2篇
排序方式: 共有1429条查询结果,搜索用时 453 毫秒
21.
With non-stop growth in network environments, communication security is necessary. A strong protocol guarantees that users and service providers are secure against many kinds of attacks, such as impersonation and replay attack. Sood et al. proposed an authentication scheme based on dynamic identity to prevent transactions from being intercepted by malicious users. Although they claimed that their scheme has advantages over previous schemes with the same approach, we prove that their scheme is vulnerable to impersonation attack and stolen verification attack, and can be affected by clock synchronization. Therefore we propose a novel authentication scheme to enhance security and overcome limitations existing in Sood’s scheme. Our security analysis shows that our proposed method can efficiently resist known types of attacks. Experimental results also show that the method can be implemented and processed in real-time thus applicable for not only regular computers but also mobile devices.  相似文献   
22.
The effect of physical aging on the fracture behavior, crack opening displacement, and plastic deformation zone of unmodified and rubber-modified epoxies was determined at two aging temperatures and different displacement rates. The strain energy release rate decreases to between 40 and 50% (for rubber modified and unmodified samples, respectively) of the unaged values after 35 days aging. Systematic dependence of the decrease in fracture toughness by aging on the rubber content is not apparent. The increased yield stress after physical aging is the main factor contributing to the reduction in fracture toughness, crack opening displacement, and plastic deformation zone. Physical aging suppresses the crack blunting mechanisms in epoxies.  相似文献   
23.
Interfacial tension between demixed solutions of polystyrene + methylcyclohexane has been measured near the critical temperature as a function of temperature using polystyrenes with molecular weights 9000 ~ 1.26 × 106. The critical exponent for the interfacial tension was determined to be about 1.30 for the lower molecular weight systems. However, for higher molecular weights the exponent could not be obtained because the system departed from critical behaviour. Magnitudes of the interfacial tension were proportional to about N?0.44, where N is the polymerization index. Experimental results were compared with the recently-proposed theories and found to be in qualitative agreement. The tricritical theory of polymer solutions was also compared with the experimental results.  相似文献   
24.
Multimedia Tools and Applications - Detection and clustering of commercial advertisements plays an important role in multimedia indexing also in the creation of personalized user content. In...  相似文献   
25.
International Journal of Control, Automation and Systems - In this paper, we consider the fuzzy moving sliding surface anti-sway control problem for container cranes. We first introduce the dynamic...  相似文献   
26.
Microsystem Technologies - This paper reports a design and fabrication process of a micro cam system (MCS) with a flat-faced translating follower. The cam rim with cover diameter of 2.4 mm...  相似文献   
27.
Artificial listeners are virtual agents that can listen attentively to a human speaker in a dialog. In this paper, we present two experiments where we investigate the perception of rule-based backchannel strategies for artificial listeners. In both, we collect subjective judgements of humans who observe a video of a speaker together with a corresponding animation of an artificial listener. In the first experiment, we evaluate six rule-based strategies that differ in the types of features (e.g. prosody, gaze) they consider. The ratings are given at the level of a speech turn and can be considered a measure for how human-like the generated listening behavior is perceived. In the second experiment, we systematically investigate the effect of the quantity, type and timing of backchannels within the discourse of the speaker. Additionally, we asked human observers to press a button whenever they thought a generated backchannel occurrence was inappropriate. Both experiments together give insights in the factors, both from an observation and generation point-of-view, that influence the perception of backchannel strategies for artificial listeners.  相似文献   
28.
The 0–1 knapsack problem (KP01) is a well-known combinatorial optimization problem. It is an NP-hard problem which plays important roles in computing theory and in many real life applications. Chemical reaction optimization (CRO) is a new optimization framework, inspired by the nature of chemical reactions. CRO has demonstrated excellent performance in solving many engineering problems such as the quadratic assignment problem, neural network training, multimodal continuous problems, etc. This paper proposes a new chemical reaction optimization with greedy strategy algorithm (CROG) to solve KP01. The paper also explains the operator design and parameter turning methods for CROG. A new repair function integrating a greedy strategy and random selection is used to repair the infeasible solutions. The experimental results have proven the superior performance of CROG compared to genetic algorithm (GA), ant colony optimization (ACO) and quantum-inspired evolutionary algorithm (QEA).  相似文献   
29.
This paper presents a methodology to apply speech technology for compensating sensory, motor, cognitive and affective usage difficulties. It distinguishes (1) an analysis of accessibility and technological issues for the identification of context-dependent user needs and corresponding opportunities to include speech in multimodal user interfaces, and (2) an iterative generate-and-test process to refine the interface prototype and its design rationale. Best practices show that such inclusion of speech technology, although still imperfect in itself, can enhance both the functional and affective information and communication technology-experiences of specific user groups, such as persons with reading difficulties, hearing-impaired, intellectually disabled, children and older adults.
Khiet P. TruongEmail:
  相似文献   
30.
We propose a method that uses reflection and transmission photoellipsometry to analyze samples consisting of thin films combined with semitransparent thick layers or substrates in the form of multilayer structures. Athick film or substrate is defined as a layer for which no interference effects can be observed for a given wavelength resolution, and contributions from multiple reflections in the substrate are taken into account in the theoretical treatment. An automatic reflection-transmission spectroscopic ellipsometer was built to test the theory, and satisfactory results have been obtained. Examples corresponding to a strongly absorbing film deposited on a glass substrate and a highly transmitting film also deposited on glass are shown. In both cases a good fit between theory and experiment is found. The photoellipsometric method presented is particularly suited to the analysis of actual samples of energy-efficient coatings for windows.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号